Widening gulf between perception and reality April 2015 Cisco unveils security manifesto as a foundation for organisations in South Africa to better understand and respond to today’s cybersecurity challenges.
Experian SA launches new fraud prevention solution 1 April 2015, Security Services & Risk Management Experian SA has launched the National Fraud Prevention Solution to address the significant threat of identity and credit application fraud in South Africa.
Understanding intelligence CCTV Handbook 2015, Vision Catcher Intelligence is gained from many aspects of surveillance that does not necessarily require a picture. Information only becomes intelligent when it is used with all other available information to provide the basis for a decision and perhaps a result.
Safer than Sony 1 March 2015 Carey van Vlaanderen, CEO of ESET Southern Africa, discusses three cyber security lessons learned from 2014’s most notorious hack.
Security in the modern age 1 March 2015 It is now universally accepted that ever-increasing sophistication in technology, however ground-breaking it may be, brings with it a host of security challenges.
The greater the innovation in how it’s ...
Careless employees the greatest mobile threat 1 January 2015 Check Point’s third annual mobile security survey highlights careless employees as the greatest mobile security threat. 82% of security professionals expect the number of mobile security incidents to increase in 2015.
IFSEC SA 2015 focuses on retaining data securely November 2014, Security Services & Risk Management Data storage and recovery has become big business as companies realise the true cost of losing all their strategic data to carelessness, fire or theft. Enterprise Strategy Group research indicates that ...
Explosion of PoS RAM scrapers November 2014 Local retailers need to be aware that these PoS threats are on the rise and 2014 has already seen the appearance of a number of new PoS RAM scraper families.
Hacking a living room October 2014 Popular connected home entertainment devices are a real cyber security threat due to vulnerabilities in their software, and a lack of elementary security measures such as strong default administrator passwords and encryption of Internet connection.
The IoT is already here – will you be secure? 1 September 2014 “We should question whether some of the great advancements in technology are designed to serve us or serve the interests of others.”
Malicious malware and your business 1 September 2014 Businesses should be aware that their security system from last year might not be protected from today’s most common malware.
A look into the cybercriminal underground August 2014 Places in the Internet where cybercriminals converge to sell and buy different products and services exist. Like any other market, the laws of supply and demand dictate prices and feature offerings.
Manager’s guide: Tailor-made security policy August 2014 With the never ending number of security threats to business information it is imperative that managers take the initiative to establish working and evolving security policies that protect the business and its assets.
Practicing good information governance August 2014 The exponential growth of data, combined with increasing regulation, has left many organisations struggling with the complexity of compliance required to manage their information.
Securing enterprise cloud applications 1 July 2014, HID Global With data now living on the wrong side of conventional internal defences in cloud-based server farms, the ground has shifted and a one-size-fits-all approach to data protection is not sufficient.
Public sector in the cloud 1 July 2014 The public sector is displaying a newfound openness towards cloud delivery models, believes Andrew Soddy of Mimecast.
Consistent malware protection 1 July 2014 Cisco expands advanced malware protection and data centre security solutions to address advanced threats from endpoint to network to cloud for customers in South Africa.
Business should anticipate greater cloud cover 1 July 2014 A reduction in the cost of data and reliability of data on fixed line and wireless media has driven more widespread use of cloud services.
Hosting in the cloud 1 July 2014 Scalability, flexibility, security and cost saving are just some of the benefits associated with a move from traditional on-premise servers to a cloud-based environment – and the business case for initiating the process is clear and strong.